


default search action
DIMACS Workshop: Distributed Computing And Cryptography 1989
- Joan Feigenbaum, Michael Merritt:
Distributed Computing And Cryptography, Proceedings of a DIMACS Workshop, Princeton, New Jersey, USA, October 4-6, 1989. DIMACS Series in Discrete Mathematics and Theoretical Computer Science 2, DIMACS/AMS 1991, ISBN 978-0-8218-6590-3 - Preface. Distributed Computing And Cryptography 1989: vii-viii
- Foreword. Distributed Computing And Cryptography 1989: ix
- Joan Feigenbaum, Michael Merritt:
Open Questions, Talk Abstracts, and Summary of Discussions. 1-46 - Donald Beaver:
Formal Definitions for Secure Distributed Protocols. 47-64 - Donald Beaver:
Perfect Privacy For Two-Party Protocols. 65-78 - Mihir Bellare, Lenore Cowen, Shafi Goldwasser:
On the Structure of Secret Key Exchange Protocols. 79-92 - Matt Bishop:
Privacy-Enhanced Electronic Mail. 93-106 - Manuel Blum, Michael Luby, Ronitt Rubinfeld:
Program Result Checking against Adaptive Programs and in Cryptographic Settings. 107-118 - Michael Burrows, Martín Abadi, Roger M. Needham:
The Scope of a Logic of Authentication. 119-126 - Deborah Estrin, Gene Tsudik:
Secure Policy Enforcement in Internetworks. 127-154 - Uriel Feige, Adi Shamir:
On Expected Polynomial Time Simulation of Zero Knowledge Protocols. 155-160 - Joan Feigenbaum, Mark Y. Liberman, Rebecca N. Wright:
Cryptographic Protection of Databases and Software. 161-172 - Michael J. Fischer, Michael S. Paterson, Charles Rackoff:
Secret Bit Transmission Using a Random Deal of Cards. 173-182 - Zvi Galil, Stuart Haber, Moti Yung:
Security against Replay Chosen-Ciphertext Attack. 183-190 - Richard J. Lipton:
New Directions In Testing. 191-202 - Michael Merritt:
Towards a Theory of Cryptographic Systems: A Critique of Crypto-Complexity. 203-212 - Alon Orlitsky:
Feeback in Discrete Communication. 213-228 - Rafail Ostrovsky, Moti Yung:
On Necessary Conditions for Secure Distributed Computation. 229-234 - Jim Reeds:
Secure IX Network. 235-244 - Marie-Jeanne Toussaint, Pierre Wolper:
Reasoning about Cryptographic Protocols. 245-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.